Gibson> Download Garbage
Ctrlk
  • Statement of purpose
  • Techniques
    • Intelligence Gathering
    • Initial Access
    • Execution
    • Privilege Escalation
    • Defense Evasion
    • Credential Access
      • Extract credentials from LSASS dump
      • Extract credentials from registry hives
      • LSA secrets extraction
      • Dumping LSASS.exe
      • Dumping registry hives
      • Dump the domain (Domain Controllers)
      • Browser cookies & passwords
      • Wi-Fi passwords
      • Clipboard
    • Infrastructure
    • Web application testing
    • Other
    • Red Team Infrastructure
    • Malware
  • Tools
    • Tools
Powered by GitBook
On this page

Was this helpful?

  1. Techniques

Credential Access

Extract credentials from LSASS dumpExtract credentials from registry hivesLSA secrets extractionDumping LSASS.exeDumping registry hivesDump the domain (Domain Controllers)Browser cookies & passwordsWi-Fi passwordsClipboard
PreviousMicrosoft Windows DefenderNextExtract credentials from LSASS dump

Last updated 4 years ago

Was this helpful?